A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.
| Vendor | Product | Versions |
|---|---|---|
| red hat | keycloak | maven/org.keycloak:keycloak-services: < 26.5.7 |
Updated severity to CRITICAL, marked as actively exploited, and noted no exploit is available.
Initial creation